{"id":"https://openalex.org/W2155499968","doi":"https://doi.org/10.1109/fskd.2011.6019833","title":"An effective feature selection method for on-line signature based authentication","display_name":"An effective feature selection method for on-line signature based authentication","publication_year":2011,"publication_date":"2011-07-01","ids":{"openalex":"https://openalex.org/W2155499968","doi":"https://doi.org/10.1109/fskd.2011.6019833","mag":"2155499968"},"language":"en","primary_location":{"id":"doi:10.1109/fskd.2011.6019833","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2011.6019833","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069047005","display_name":"Eman Alattas","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Eman Alattas","raw_affiliation_strings":["Information Technology Department, CCIS - King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Information Technology Department, CCIS - King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5084412445","display_name":"Souham Meshoul","orcid":"https://orcid.org/0000-0002-9072-5878"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Souham Meshoul","raw_affiliation_strings":["Center of Excellence in Information Assurance COEIA, CCIS - King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Center of Excellence in Information Assurance COEIA, CCIS - King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5069047005"],"corresponding_institution_ids":["https://openalex.org/I28022161"],"apc_list":null,"apc_paid":null,"fwci":0.8552,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.80815138,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"4431","issue":null,"first_page":"1431","last_page":"1436"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T10601","display_name":"Handwritten Text Recognition Techniques","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7594174742698669},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.659866988658905},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.6190237998962402},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.5385068655014038},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.5294731855392456},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5222759246826172},{"id":"https://openalex.org/keywords/representation","display_name":"Representation (politics)","score":0.4974420368671417},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.48711514472961426},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.46244674921035767},{"id":"https://openalex.org/keywords/particle-swarm-optimization","display_name":"Particle swarm optimization","score":0.4606066048145294},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4181986451148987},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.408292680978775},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.32020318508148193},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13988333940505981}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7594174742698669},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.659866988658905},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.6190237998962402},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.5385068655014038},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.5294731855392456},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5222759246826172},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.4974420368671417},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.48711514472961426},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.46244674921035767},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.4606066048145294},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4181986451148987},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.408292680978775},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32020318508148193},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13988333940505981},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fskd.2011.6019833","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2011.6019833","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1566399673","https://openalex.org/W1831322009","https://openalex.org/W1972213840","https://openalex.org/W1972682745","https://openalex.org/W1987161086","https://openalex.org/W2004988719","https://openalex.org/W2027964569","https://openalex.org/W2085766355","https://openalex.org/W2088934673","https://openalex.org/W2105881518","https://openalex.org/W2117489990","https://openalex.org/W2118002292","https://openalex.org/W2119387367","https://openalex.org/W2125181156","https://openalex.org/W2128302767","https://openalex.org/W2131991463","https://openalex.org/W2144680741","https://openalex.org/W2147597509","https://openalex.org/W2148085371","https://openalex.org/W2149340496","https://openalex.org/W2149605730","https://openalex.org/W2152195021","https://openalex.org/W2169701969","https://openalex.org/W6681860052","https://openalex.org/W6685001953"],"related_works":["https://openalex.org/W1671124163","https://openalex.org/W2168674042","https://openalex.org/W2535275505","https://openalex.org/W3030774134","https://openalex.org/W2104499293","https://openalex.org/W3019402777","https://openalex.org/W4386564352","https://openalex.org/W2952668426","https://openalex.org/W2104321465","https://openalex.org/W4250384982"],"abstract_inverted_index":{"In":[0,95],"this":[1],"paper,":[2],"we":[3,98],"tackle":[4],"the":[5,9,34,44,50,70],"problem":[6],"of":[7,12,27,47,64,73,113,131],"identifying":[8],"relevant":[10,61,74],"set":[11,26,46,72,126],"features":[13,28,48,59,75],"that":[14,29],"helps":[15],"achieving":[16,84],"accurate":[17],"on-line":[18],"signature":[19],"based":[20],"authentication.":[21],"There":[22],"exists":[23],"a":[24,77,102,121,132],"large":[25],"can":[30],"be":[31],"acquired":[32],"from":[33,39,137],"original":[35],"signal":[36],"or":[37],"derived":[38],"it.":[40],"Taking":[41],"into":[42],"account":[43],"whole":[45],"in":[49,93,129,145],"authentication":[51,82],"process":[52],"is":[53,76,91,117,127],"time":[54],"consuming.":[55],"Furthermore,":[56],"not":[57],"all":[58],"are":[60,66],"and":[62],"some":[63],"them":[65],"redundant.":[67],"Consequently,":[68],"finding":[69],"minimal":[71],"prerequisite":[78],"to":[79,120],"perform":[80],"fast":[81],"while":[83],"better":[85],"accuracy.":[86],"This":[87],"feature":[88,115],"selection":[89],"task":[90],"combinatorial":[92],"nature.":[94],"our":[96,146],"work,":[97],"handle":[99],"it":[100],"using":[101],"Discrete":[103],"Quantum":[104],"behaved":[105],"Particle":[106],"Swarm":[107],"Optimization":[108],"strategy":[109],"(DQPSO).":[110],"The":[111],"space":[112],"possible":[114],"sets":[116,136],"explored":[118],"according":[119],"QPSO":[122],"dynamic":[123],"where":[124],"each":[125],"encoded":[128],"terms":[130],"binary":[133],"representation.":[134],"Data":[135],"SVC":[138],"2004":[139],"data":[140],"base":[141],"have":[142,151],"been":[143,152],"used":[144],"experiments.":[147],"Very":[148],"encouraging":[149],"results":[150],"obtained.":[153]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2014,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
